CN1462020A - Ciphor safety technology - Google Patents

Ciphor safety technology Download PDF

Info

Publication number
CN1462020A
CN1462020A CN 02122507 CN02122507A CN1462020A CN 1462020 A CN1462020 A CN 1462020A CN 02122507 CN02122507 CN 02122507 CN 02122507 A CN02122507 A CN 02122507A CN 1462020 A CN1462020 A CN 1462020A
Authority
CN
China
Prior art keywords
password
victim
crypto
black
criminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN 02122507
Other languages
Chinese (zh)
Inventor
李桂华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 02122507 priority Critical patent/CN1462020A/en
Publication of CN1462020A publication Critical patent/CN1462020A/en
Withdrawn legal-status Critical Current

Links

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

A high-safety cipher technique for the deposit book, bank card, etc features that its cipher is composed of a correct cipher and an additional cipher. When the cipher is input, the system can determine that the current user is illegal.

Description

Ciphor safety technology
The present invention relates to a kind of sign of identity verification, especially password.
Nowadays bank. the bankbook of units such as security, bank card, security fund card all access to your password when identifying user identity, and what the overwhelming majority was used is the password that string number is formed, and what few part was used is the fingerprint password.The password input correctly then can further be operated, otherwise can not continue operation.And present many people are placed on bank card, bankbook, fund card at one's side, and after being kidnapped, the robber can press out password for an answer, take out victim's money, allow the victim suffer a loss.If what the victim said is dummy letter, banking system was only thought validated user input error for the moment when criminal reached money, the victim can be basted one surely after criminal goes back, and the victim have to surrender password.The criminal who has is afraid of that the victim says his figure and features feature, simply kills all so that there won't be any eyewitness left, and chops up a corpse and obliterate all traces.Scientific-technical progress in the future, after finger-print cipher was popularized, criminal may cut off victim's finger, fingerprint with the victim is withdrawn cash, criminal can be placed on victim's finger in the pocket, and the temperature of being somebody's turn to do finger like this is similar with normal person's body temperature, and instrument is difficult to identification, and this is a severed finger.At this moment interests of victims and personal safety all can not get ensureing in a word.
The purpose of this invention is to provide a kind of Ciphor safety technology, the injured party is not suffered a loss, the criminal is grabbed immediately, and the injured party is rescued rapidly.
The solution that the present invention adopts is: bank opens an account when password is set to the user, outside correct password, a kind of password is set again, be called " black crypto ", after the user is held as a hostage, when criminal asks password, just say " black crypto ", what criminal's bank computer system when withdrawing cash found that he imports is " black crypto ", just can conclude that he is criminal, rather than user's input error, can report to the police at once, take his photo, catch this person, start with from him then and catch the partner, the rescue victim.
Owing to used " black crypto " in the above-mentioned solution; when the password mistake of remittee input, can judge him is validated user, can not allow the offender from slipping away under one's eyes; protected interests of victims fully, the approach of emergency is provided to the victim.
Implement when of the present invention, bank makes a modification slightly to program in the computing machine, just can be provided with and " black crypto ", because the used software of each bank has nothing in common with each other, so each bank technology personnel will handle according to used software feature.When " black crypto " being set to the user, its quantity not necessarily, " black crypto " is advisable with 2 to 4, and 2 of people are arranged among the user, and 3 of people are arranged, and 4 of people are arranged, do not need yet too many, many not remembering, but want 2 at least.After the user is provided with correct password, " black crypto ", when criminal presses password for an answer, the victim just says " black crypto ", and criminal is as worried, when asking his " black crypto " again, the victim just says another " black crypto ", criminal may think that the victim deliberately puts upside down, in being to use another password, like this, as long as criminal dares to withdraw cash, just necessarily caught.In bank, imported " black crypto " if any the people, bank sends someone to keep a careful watch on him at once, reports to the police, on ATM, imported " black crypto " if any the people, its supporting camera video camera is photographed his photo at once, and reports to the police, sound the alarm, allow near the people of ATM help to arrest, after arresting, the rescue victim.Security fund card and bankbook, bank card are similar, as input be " black crypto ", then to report to the police.The password of other field nearly all can use the present invention.

Claims (2)

  1. (1) a kind of Ciphor safety technology that accesses to your password is characterized in that: outside correct password, also have other password, when input be this password the time, system can assert that input password person is illegal user, rather than validated user is inputed by mistake because of carelessness.
  2. (2) according to the described Ciphor safety technology of claim (1), it is characterized in that: the quantity of this password is no less than two.
CN 02122507 2002-05-30 2002-05-30 Ciphor safety technology Withdrawn CN1462020A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 02122507 CN1462020A (en) 2002-05-30 2002-05-30 Ciphor safety technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 02122507 CN1462020A (en) 2002-05-30 2002-05-30 Ciphor safety technology

Publications (1)

Publication Number Publication Date
CN1462020A true CN1462020A (en) 2003-12-17

Family

ID=29743251

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 02122507 Withdrawn CN1462020A (en) 2002-05-30 2002-05-30 Ciphor safety technology

Country Status (1)

Country Link
CN (1) CN1462020A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100350436C (en) * 2005-09-15 2007-11-21 武汉大学 Cipher anti-theft method for bank deposit
CN107578576A (en) * 2017-08-22 2018-01-12 张德珍 The method for making hijacker to be withdrawn the money with password

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100350436C (en) * 2005-09-15 2007-11-21 武汉大学 Cipher anti-theft method for bank deposit
CN107578576A (en) * 2017-08-22 2018-01-12 张德珍 The method for making hijacker to be withdrawn the money with password
CN107578576B (en) * 2017-08-22 2020-12-01 张德珍 Method for preventing hijacker from darting to draw money by using password

Similar Documents

Publication Publication Date Title
RU2558617C2 (en) Secured personal data handling and management system
US20210089635A1 (en) Biometric identity verification and protection software solution
KR20050074950A (en) Secure biometric verification of identity
US20020059521A1 (en) Method and system for identifying a user
CA2465258A1 (en) National identification card system and biometric identity verification method for negotiating transactions
CN108664784A (en) Alarm method, apparatus and system
TW200411572A (en) Secure biometric verification of identity cross reference to related applications
AU2016229221A1 (en) System and apparatus for biometric identification of a unique user and authorization of the unique user
CN103646202A (en) Fingerprint information coding encryption and application method
US7561183B1 (en) Mobile issuance of official documents with biometric information encoded thereon
JP2006527422A (en) Systems and information regarding secure personal authentication, information processing, and precise timing of contact location and timing
CN111698215A (en) Security prevention and control method, device and system based on biological feature recognition
CN107578576B (en) Method for preventing hijacker from darting to draw money by using password
CN109522694A (en) A kind of identification system based on computer network
US20210334813A1 (en) Systems and methods for monitoring health and cognitive ability of a customer
JP2007220000A (en) Portable terminal apparatus for authentication and portable terminal program for authentication
CN1462020A (en) Ciphor safety technology
JP3921942B2 (en) Authentication system
JPH11167553A (en) Personal confirmation system for on-line system
JP2001325434A (en) System for confirming identity by utilizing biological features
Boyle Older Adults and Scam Awareness
CN1417702A (en) Bank safety alarm system and method
Hunter London terrorist attacks heat up identity card debate and highlight uncertainties over their efficacy
Coats The practitioner's guide to biometrics
JPH09180036A (en) Ic card system with user identifying function

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C04 Withdrawal of patent application after publication (patent law 2001)
WW01 Invention patent application withdrawn after publication